Patent classifications
G06F11/328
Methods, apparatus, and articles of manufacture to deploy software applications
Methods, apparatus, and articles of manufacture to deploy software applications are disclosed. A disclosed example includes query a user for a first parameter indicative of a capacity level needed for a software system and a second parameter indicative of a set of software applications to be installed for the software system, determine a group of components of the software system to be installed on the computer system based on the first parameter and the second parameter, determine a computer hardware requirement based on the set of software applications, compare the determined computer hardware requirement to a computer hardware configuration, indicate that the computer hardware configuration is sufficient when the computer hardware configuration at least meets the determined computer hardware requirement, and when the computer hardware configuration is sufficient, configure the set of software applications by installing the determined group of components of the set of software applications.
DYNAMIC THRESHOLDS TO IDENTIFY SUCCESSIVE ALERTS
A method of identifying successive alerts associated with a detected deviation from an operational state of a device includes receiving feature data corresponding to an alert indication and including time series data for multiple sensor devices associated with the device. The method includes determining, based on a first portion of the feature data, first feature importance data of a first alert associated with the first portion of the feature data and determining a first alert threshold corresponding to the first alert. The method includes determining, based on a second portion of the feature data that is subsequent to the first portion, a metric corresponding to second feature importance data of the second portion. The method includes comparing the metric to the first alert threshold to determine whether the second portion corresponds to the first alert or to a second alert that is distinct from the first alert.
MODIFYING THE APPEARANCE OF OBJECTS BASED ON A PROGRESS OF A TASK
A computer-implemented method, system, and computer device for modifying an appearance of an object in an electronic display of a computer device based on a progress of a task is provided. The method includes monitoring a progress of a first task of a first application. The method also includes identifying a first object of a second application, and modifying an appearance of the first object of the second application based on the progress of the first task, wherein the second application is distinct from the first application.
Systems and Methods For Automatically Characterizing Performance Of A Hypervisor System
Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on lower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance.
Methods and Systems for Providing Status Indicators with an Electronic Device
An electronic device includes one or more sensors, one or more processors operable with the one or more sensors, and a status indicator configured to indicate whether an authorized user of the electronic device is busy, free, or somewhere in between. The status indicator can operate in at least a first state and a second state that is different from the first state. The first state indicates the authorized user is busy and should not be disturbed, while the second state indicates the authorized user is free. Red light can be emitted in the first state, and green light in the second state. The state of the status indicator can be set manually, such as with a chopping gesture, or automatically, such as from calendar events stored in a calendaring operation.
ANOMALY DETECTION AND ROOT CAUSE ANALYSIS IN A MULTI-TENANT ENVIRONMENT
System and methods are described for anomaly detection and root cause analysis in database systems, such as multi-tenant environments. In one implementation, a method comprises receiving an activity signal representative of resource utilization within a multi-tenant environment; detecting a plurality of anomalies in the activity signal; computing a priority score for each of the plurality of anomalies; correlating at least a subset of the plurality of anomalies to one or more performance metrics of the multi-tenant environment; and transmitting a remediation signal to one or more devices in the multi-tenant environment based on the correlations and the priority scores.
COMPUTER DEVICES AND COMPUTER IMPLEMENTED METHODS
A computer device processes frame data provided by running of a computer app, the frame data comprising a plurality of events occurring in the computer ap. A display displays information associated with one or more frames of the plurality of frames. At least one processor of the computer device determines a node graph, in response to input from a user, for one or more events associated with one or more frames from the frame data and that node graph is displayed.
GENERATING AND AGGREGATING TEST RESULT DATA OF A DISTRIBUTED SYSTEM OF DEVICES INTO A TEST CASE RESULT FOR FACILITATING ACCESS OF THE TEST CASE RESULT VIA A SINGLE ITERATOR
Generating and aggregating test result data of a distributed system of devices into a test case result for facilitating access of the test case result via a single iterator is presented herein. A coordinator component of the distributed system of devices creates respective context identifiers for each unique phase of a test case of the distributed system of devices, and sends messages including the respective context identifiers to a producer component of the distributed system of devices. In this regard, the producer component includes producers having respective services executing processes corresponding to an execution of the test case. The messages instruct the respective services to associate the respective context identifiers with events representing result data of the processes, and the respective context identifiers facilitate respective accesses of the events representing the result data of the processes.
Rollback-Free Referential Integrity Update Processing
An import job associated with a data store update is inspected and schemas associated with target data tables that are to be updated with update data are analyzed. Referential integrity issues associated with foreign keys in the target tables are identified in the update data. The update data is broken into three portions, a first portion that is guaranteed to not have a referential integrity issue, a second portion this is known to have a referential integrity issue, and a third portion that cannot be determined at this stage of processing. The import job is modified to update the corresponding target tables with the first portion of the update data while the second and third portions are not updated to the target data base tables but a custom message is recorded in fields associated with the second and third portions that describes the issue for subsequent review/resolution.
Adaptive metric collection, storage, and alert thresholds
Techniques for adaptive metric collection, metric storage, and alert thresholds are described. In an approach, a metric collector computer processes metrics as a collection of key/value pairs. The key/value pairs represent the dimensionality of the metrics and allows for semantic queries on the metrics based on keys. In an approach, a storage controller computer maintains a storage system with multiple storage tiers ranked by speed of access. The storage computer stores policy data that specifies the rules by which metric records are stored across the multiple storage tiers. Periodically, the storage computer moves database records to higher or lower tiers based on the policy data. In an approach, a metric collector in response to receiving a new metric, generates a predicted metric value based on previously recorded metric values and measures the deviation from the new metric value to determine whether an alert is appropriate.